Online Book Reader

Home Category

Managing NFS and NIS, 2nd Edition - Mike Eisler [279]

By Root 500 0

7.4.2. Client data caching

7.4.3. Server-side caching

7.5. File locking

7.5.1. Lock and status daemons

7.5.2. Client lock recovery

7.5.3. Recreating state information

7.6. NFS futures

7.6.1. NFS Version 4

7.6.2. Security

8. Diskless Clients

8.1. NFS support for diskless clients

8.2. Setting up a diskless client

8.3. Diskless client boot process

8.3.1. Reverse ARP requests

8.3.2. Getting a boot block

8.3.3. Booting a kernel

8.3.4. Managing boot parameters

8.4. Managing client swap space

8.5. Changing a client's name

8.6. Troubleshooting

8.6.1. Missing and inconsistent client information

8.6.2. Checking boot parameters

8.6.3. Debugging rarpd and bootparamd

8.6.4. Missing /usr

8.7. Configuration options

8.7.1. Dataless clients

8.7.2. Swapping on a local disk

8.8. Brief introduction to JumpStart administration

8.9. Client/server ratios

9. The Automounter

9.1. Automounter maps

9.1.1. Indirect maps

9.1.2. Inside the automounter

9.1.3. Direct maps

9.2. Invocation and the master map

9.2.1. The master map

9.2.2. Command-line options

9.2.3. The null map

9.2.4. Tuning timeout values

9.3. Integration with NIS

9.3.1. Mixing NIS and files in the same map

9.3.2. Updating NIS-managed automount maps

9.4. Key and variable substitutions

9.4.1. Key substitutions

9.4.2. Variable substitutions

9.5. Advanced map tricks

9.5.1. Replicated servers

9.5.2. Hierarchical mounts

9.5.3. Conversion of direct maps

9.5.4. Multiple indirection

9.5.5. Executable indirect maps

9.6. Side effects

9.6.1. Long search paths

9.6.2. Avoiding automounted filesystems

10. PC/NFS Clients

10.1. PC/NFS today

10.2. Limitations of PC/NFS

10.2.1. NFS versus SMB (CIFS)

10.2.2. Why PC/NFS?

10.3. Configuring PC/NFS

10.3.1. Server-side PC/NFS configuration

10.4. Common PC/NFS usage issues

10.4.1. Mounting filesystems

10.4.2. Checking file permissions

10.4.3. Unix to Windows/NT text file conversion

10.5. Printer services

11. File Locking

11.1. What is file locking?

11.1.1. Exclusive and shared locks

11.1.2. Record locks

11.1.3. Mandatory versus advisory locking

11.1.4. Windows/NT locking scheme

11.2. NFS and file locking

11.2.1. The NLM protocol

11.2.2. NLM recovery

11.2.3. Mandatory locking and NFS

11.2.4. NFS and Windows lock semantics

11.3. Troubleshooting locking problems

11.3.1. Diagnosing NFS lock hangs

11.3.2. Examining lock state on NFS/NLM servers

11.3.3. Clearing lock state

12. Network Security

12.1. User-oriented network security

12.1.1. Trusted hosts and trusted users

12.1.2. Enabling transparent access

12.1.3. Using netgroups

12.2. How secure are NIS and NFS?

12.3. Password and NIS security

12.3.1. Managing the root password with NIS

12.3.2. Making NIS more secure

12.3.3. Unknown password entries

12.4. NFS security

12.4.1. RPC security

12.4.2. Superuser mapping

12.4.3. Unknown user mapping

12.4.4. Access to filesystems

12.4.5. Read-only access

12.4.6. Port monitoring

12.4.7. Using NFS through firewalls

12.4.8. Access control lists

12.5. Stronger security for NFS

12.5.1. Security services

12.5.2. Brief introduction to cryptography

12.5.3. NFS and IPSec

12.5.4. AUTH_DH: Diffie-Hellman authentication

12.5.5. RPCSEC_GSS: Generic security services for RPC

12.5.6. Planning a transition from NFS/sys to stronger NFS security

12.5.7. NFS security futures

12.6. Viruses

13. Network Diagnostic and Administrative Tools

13.1. Broadcast addresses

13.2. MAC and IP layer tools

13.2.1. ifconfig: interface configuration

13.2.2. Subnetwork masks

13.2.3. IP to MAC address mappings

13.2.4. Using ping to check network connectivity

13.2.5. Gauging Ethernet interface capacity

13.3. Remote procedure call

Return Main Page Previous Page Next Page

®Online Book Reader